CN102419805B - Terminal equipment and method for encrypting user information - Google Patents

Terminal equipment and method for encrypting user information Download PDF

Info

Publication number
CN102419805B
CN102419805B CN201110373961.3A CN201110373961A CN102419805B CN 102419805 B CN102419805 B CN 102419805B CN 201110373961 A CN201110373961 A CN 201110373961A CN 102419805 B CN102419805 B CN 102419805B
Authority
CN
China
Prior art keywords
information
user
encryption
input
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110373961.3A
Other languages
Chinese (zh)
Other versions
CN102419805A (en
Inventor
唐贵杰
韩辰
雷春雪
李春雨
谢群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo youth excellent product sharing technology Co.,Ltd.
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110373961.3A priority Critical patent/CN102419805B/en
Publication of CN102419805A publication Critical patent/CN102419805A/en
Application granted granted Critical
Publication of CN102419805B publication Critical patent/CN102419805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses terminal equipment and a method for encrypting user information. The terminal equipment comprises an encryption chip and a terminal main body, wherein the terminal main body is used for acquiring the biological information and private information of a user; and the encryption chip is used for encrypting the private information of the user by using biological identification information as a key and using an encryption algorithm, sending encrypted information to the terminal main body, and storing the encrypted information. By adoption of the technical scheme, a mobile internet device (MID) can change a display policy according to different external lighting environments, so that the satisfaction of visual sensory of the user is improved, and the performance of products is improved. A hardware solution of the encryption chip is superior to a software method in terms of both speed and performance. By adoption of a biological identification technology, the user does not need to memorize any password; and operation processes of encryption, decryption, display and input are finished inside the encryption chip without adoption of a mobile phone, so that information leakage caused by a virus or Trojan in the mobile phone is avoided.

Description

A kind of terminal device and user profile encryption method thereof
Technical field
The present invention relates to communication technical field, more specifically, relate to a kind of terminal device and user profile encryption method thereof.
Background technology
People live in modern society, every day all can come into contacts with dissimilar password, the startup password of work computer, the password of bank card, the login password of personal electric mailbox, the password of various registration of website, the password of the Internet bank, security exchange password etc., can say that we live in an environment surrounded by password.Although the length of often kind of password, figure place, kind are different.But any one password is revealed or is lost the massive losses that all can cause user.
Current most of user adopts some to be referred to as password, such as birthday, telephone number, identification card number, name etc. to oneself relatively more special numeral or name.And a lot of people simply easily remembers to make password, and same password all can be adopted to deal with different application, such as multiple bank cards share password etc.From cryptographic angle, above all modes setting up password all can bring huge hidden danger.Unique people is easily via exhaustive, and the method for dictionary attack cracks the more weak password of intensity, obtains the confidential information of user, steals property and the individual privacy of user.Therefore; user cipher preferably adopts the numeral or title that are not easily cracked and guess; and various password had better not be identical or close; so; the more effective protection user cipher of ability; but like this, bring again a problem, that is exactly that so numerous and diverse and many passwords faced by user often may be forgotten.
Summary of the invention
For making up above-mentioned deficiency, the present invention proposes a kind of terminal device, and described terminal device comprises encryption chip and terminal body;
Described terminal body gathers user biological information and user's private information;
Described encryption chip to described user's private information with described biometric information for key is encrypted by cryptographic algorithm, and by encryption after information send to terminal body to store.
Further, when user needs to decipher its user's private information, again can input identical user biological information, encryption chip decrypts user's private information with this user biological information for enciphered message described in secret key decryption.
Further, described encryption chip comprises terminal screen control module, enciphering algorithm module, the module communicated with terminal master chip, input control module and biometric information load module;
Described terminal screen control module is for outputting to terminal display screen by private information;
Described enciphering algorithm module is used for encrypting user's private information;
The described module communicated with terminal master chip is for communicating with terminal master chip;
Described input control module is used for control information input and the input of the information of reception;
Described biometric information load module is for gathering biological information and identifying biological information.
Further, described cryptographic algorithm is one or the combination of AES, DES, RSA, MD5.
Further, described user biological information be finger print information, iris information, facial information, venous information, ear line information one or combination.
The present invention proposes a kind of user profile encryption method, and described encryption method comprises: user terminal main body gathers user biological information and user's private information; By encryption chip to described user's private information with described biometric information for key adopt cryptographic algorithm encryption, and by encryption after information send to terminal body to store.
Further, when user needs to decipher its user's private information, again can input identical user biological information, encryption chip is using this user biological information as enciphered message described in secret key decryption and decrypt user's private information.
Further, described encryption chip comprises terminal screen control module, enciphering algorithm module, the module communicated with terminal master chip, input control module and biometric information load module;
Described terminal screen control module is for outputting to terminal display screen by private information;
Described enciphering algorithm module is used for encrypting user's private information;
The described communication module with terminal chip is used for communicating with terminal master chip;
Described input control module is used for control information input and input of receiving information;
Described biometric information load module is for gathering biological information and identifying biological information.
Further, described cryptographic algorithm is one or the combination of AES, DES, RSA, MD5.
Further, described user biological information be finger print information, iris information, facial information, venous information, ear line information one or combination.
In sum, the present invention is adopted to have following beneficial effect:
Adopt the hardware solution of encryption chip, speed and performance are all better than software approach; Adopt biological identification technology, do not need user to remember any password; All encryptions, deciphering, display, all completing in encryption chip inside of the operating process such as input, does not need by mobile phone, avoids the information leakage that in mobile phone, virus or wooden horse cause.
Accompanying drawing explanation
Fig. 1 is embodiment of the present invention terminal device structural representation;
Fig. 2 is embodiment of the present invention user profile encryption method process flow diagram;
Fig. 3 is embodiment of the present invention user profile decryption method process flow diagram.
Embodiment
The present invention overcomes the encryption and decryption process existed in prior art and depends on running software in mobile phone, if the implanted virus of the mobile phone of user and trojan horse program, just can monitor the information in user mobile phone internal memory, steal password (key) or the rear password exported of deciphering of user's input, cause great property economic loss to user.
The present invention comprises encryption chip and terminal body two parts.The built-in cryptographic algorithm of encryption chip can be one or the combination of the multiple encryption method such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), RSA (Rivest Shamir and Adleman), MD5 (Message Digest Algorithm), and the present invention is just described for AES128 algorithm.
The key of AES encryption algorithm is that biometric information identification module is extracted, and forms with user identity the one section of condition code uniquely identified.Should be noted that the biological information recognition method that biometric information identification module adopts can be the one of the multiple methods such as fingerprint recognition, iris recognition, face recognition, hand vein recognition, the identification of ear line or combine, the present invention is just described for fingerprint recognition.
Encryption chip is realized by FPGA at present, comprises five modules: mobile phone screen control module, AES encryption algoritic module, the module communicated with mobile phone master chip, keyboard control module and biometric information load module.
AES encryption algorithm is realized by the hardware circuit of FPGA inside programming, and the key of AES encryption algorithm is unique biometric information that user inputs.In order to without handpiece portion, so user inputs biometric information be input to encryption chip inside, equally for security reasons, the password exported after deciphering does not need through mobile phone primary control program yet, is directly outputted on mobile phone display screen by the mobile phone screen control module in encryption chip.
Below in conjunction with the drawings and specific embodiments, technical solution of the present invention is described in further detail.Below in embodiment, terminal device of the present invention is described for mobile phone.
As shown in Figure 1, embodiment of the present invention terminal device structural representation, described terminal device is made up of mobile phone body and encryption chip two parts, wherein display screen and keyboard belong to mobile phone body part, be exactly the display screen and keyboard that usually adopt, be connected to mobile phone master chip by corresponding signal wire via encryption chip, during normal work, encryption chip is equivalent to path effect, can not impact the normal input of mobile phone and display.Mobile phone master chip carries out message exchange by communication interface and encryption chip.
Encryption chip is realized by FPGA at present, comprises five modules: mobile phone screen control module, AES encryption algoritic module, with the communication module of mobile phone master chip, keyboard control module and biometric information load module.
Described mobile phone screen control module is for outputting to mobile phone display screen by output password.
Described AES encryption algoritic module is used for encrypting user profile.
The described communication module with mobile phone master chip is used for communicating with mobile phone master chip.
Described keyboard control module is used for supervisory keyboard input and accepts input through keyboard.
Described biometric information load module is for gathering biological information and identifying biological information.
Please refer to shown in Fig. 2, be embodiment of the present invention user profile encryption method process flow diagram, it comprises the steps:
S201: first point out user's input to need the managing detailed catalogue setting up password;
Such as user needs the encrypted message setting up China Merchants Bank's card, input " China Merchants Bank's card ".
S202: mobile phone enters encrypted state by communication interface notice encryption chip, and points out user to input unique password (key);
S203: encryption chip disconnects the connection of mobile phone and keyboard;
S204: user inputs biometric information, such as finger print information;
S205: encryption chip sends information to mobile phone master chip, notice mobile phone display screen display reminding user inputs password;
S206: the password that user inputs is encrypted by encryption chip;
S207: the information after encryption sends to chip for cell phone and managing detailed catalogue one_to_one corresponding to store.
In above-mentioned steps, mobile phone prompting user carries out the input service of fingerprint identification information, simultaneously encryption chip cuts off the connection of the input medias such as keyboard and mobile phone, and the communication of usual keyboard and master chip at this moment user can input corresponding password, and the password of usual bank card is 6 bit digital.Bits per inch word take up room be a byte (8 bit) complete input rear 6 numerals be just stored in encryption chip inside, need user to input twice, Password Input for confirmation is errorless.6 numerals occupy the space of 48 bits, and AES encryption algorithm needs at least to input 128 Bit datas, so want to be encrypted the data of 48 bits, need to fill code data.The mode of filling is chosen as complete zero or the good mode of miscellaneous stipulations.Usual all kinds of password takes up room and is all less than 16 bytes (128 bit), so the present invention only needs to carry out aes algorithm can complete ciphering process to a password.Data after encryption are sent to mobile phone by communication interface by encryption chip, and store with encrypted message " China Merchants Bank blocks " one_to_one corresponding that user inputs.It should be noted that if user needs the Cipher Processing mode of input alphabet numeral mixing, first it should be noted that the input pattern that mobile phone is given tacit consent to is digital form, at this moment mobile phone needs to notify encryption chip by communication interface, if press certain key of lower keyboard, then input pattern switches to alphabetic mode; Then the information of encryption chip to input through keyboard judges, if switch key is typed to, then encryption chip does not tackle input through keyboard, ensures that input mode switches to alphabetic mode, if other buttons are transfused to, encryption chip intercepts corresponding input information, and preserves.Letter or digital by what differentiate that the method for switch key can control encryption chip identification user input, and the information of its correspondence is kept in encryption chip, after each successfully input password, encryption chip all can pass through communication interface, and prompting mobile telephone set display Ying Jing have input how many passwords.After user completes Password Input, then send to mobile phone after aes algorithm encryption.
Please refer to shown in Fig. 3, be embodiment of the present invention user profile decryption method process flow diagram, it comprises the steps:
S301: mobile phone prompting user selects the managing detailed catalogue needing password for inquiry;
S302: the enciphered message corresponding with managing detailed catalogue is sent to encryption chip by communication interface by mobile phone, and notify that it enters decrypted state, and point out user to input unique password (key);
S303: user inputs biometric information;
S304: the key that encryption chip utilizes user to input and the enciphered message that mobile phone sends are decrypted operation;
S305: encryption chip disconnects the connection of mobile phone and screen;
S306: the password after deciphering is shown to mobile phone screen by encryption chip.
In above-mentioned flow process, first user is needed to select to need the managing detailed catalogue of output password, then the enciphered message corresponding with user-selected managing detailed catalogue is sent to encryption chip by communication interface, input fingerprint identification information by mobile phone display screen prompting user simultaneously, after the fingerprint identification information receiving user's input, encryption chip is decrypted (key is the fingerprint identification information that user inputs) the enciphered message inputted from mobile phone.And interrupt mobile phone display screen and be connected with the electric signal of mobile phone, take over the control to mobile phone display screen by encryption chip, the password after deciphering is shown on mobile phone display screen.Can be arranged through displaying time, after such as showing 1 minute, encryption chip exits the control to display screen, and empties corresponding stored password reservoir expressly, turns back to and again receives the state that mobile phone sends enciphered message.During display decodement, because original password may because figure place is not enough through filling process, needing user to judge if there is continuous print zero and the partial password cleartext information finished up with zero, is not the encrypted message that user inputs.
It should be noted that previous exemplary illustrates is all for the mobile phone inputted with full keyboard, if user uses touch screen mobile phone, the then connection of the similar keyboard of the connection of touch screen and mobile phone and mobile phone, realize principle also similar, the data of encryption chip to touch screen are only needed to resolve, if press certain region of touch screen, then input pattern switches to alphabetic mode; Encryption chip is by judging the touch screen area information of input, if switch key region is triggered, then encryption chip does not tackle input through keyboard, ensures that input mode switches to alphabetic mode, if other buttons are transfused to, encryption chip intercepts corresponding input information, and preserves.Be letter or digital by what differentiate that the method for switch key toggle area can control encryption chip identification user input, and the information of its correspondence is kept in encryption chip, after completing Password Input, then send to mobile phone after aes algorithm encryption.
This design proposal comprehensively uses fingerprint identification technology, AES encryption algorithm provides very high safety standard, encrypting and decrypting process depends on hardware encryption chip and realizes, do not undertaken by cell phone software, ensure that all encrypted messages expressly do not enter mobile phone EMS memory or associated external memory, the trojan horse program can not implanted by mobile phone or virus are stolen.
The present invention also can have numerous embodiments; do not deviating from the situation of the present invention's spirit and essence thereof; those of ordinary skill in the art can make various corresponding change or change according to the present invention certainly; in every case done within the spirit and principles in the present invention any amendment, equivalent replacement, improvement, all should be included within protection scope of the present invention.

Claims (10)

1. a terminal device, is characterized in that, described terminal device comprises encryption chip and terminal body;
Described terminal body prompting user inputs managing detailed catalogue corresponding to the user's private information that need encrypt, and wherein, described terminal body comprises terminal master chip and keyboard;
Described terminal body notifies that described encryption chip enters encrypted state, and points out user to input user biological information;
The connection of described encryption chip disconnected end master chip and keyboard;
Described encryption chip gathers the user biological information of user's input;
Described terminal body prompting user inputs the user's private information that need encrypt, and described encryption chip gathers described user's private information of user's input;
Described encryption chip to described user's private information with user biological information for key is encrypted by cryptographic algorithm, and by encryption after information send to terminal body to store.
2. terminal device as claimed in claim 1, it is characterized in that, when user needs to decipher its user's private information, again input identical user biological information, encryption chip with this user biological information for described in secret key decryption encryption after information and decrypt user's private information.
3. terminal device as claimed in claim 1, it is characterized in that, described encryption chip comprises terminal screen control module, enciphering algorithm module, the module communicated with terminal master chip, input control module and biometric information load module;
Described terminal screen control module is for outputting to terminal display screen by user's private information;
Described enciphering algorithm module is used for encrypting user's private information;
The described module communicated with terminal master chip is for communicating with terminal master chip;
Described input control module is used for control information input and the input of the information of reception;
Described biometric information load module is for gathering user biological information and identifying user biological information.
4. terminal device as claimed in claim 1, is characterized in that, described cryptographic algorithm is one or the combination of AES, DES, RSA, MD5.
5. terminal device as claimed in claim 1, is characterized in that, described user biological information is finger print information, one of iris information, facial information, venous information, ear line information or combine.
6. a user profile encryption method, is characterized in that, described encryption method comprises:
Terminal body prompting user inputs managing detailed catalogue corresponding to the user's private information that need encrypt, and wherein, described terminal body comprises terminal master chip and keyboard;
Described terminal body notice encryption chip enters encrypted state, and points out user to input user biological information;
The connection of described encryption chip disconnected end master chip and keyboard;
Described encryption chip gathers the user biological information of user's input;
Described terminal body prompting user inputs the user's private information that need encrypt, and described encryption chip gathers described user's private information of user's input;
By encryption chip to described user's private information with user biological information for key adopt cryptographic algorithm encryption, and by encryption after information send to terminal body to store.
7. method as claimed in claim 6, it is characterized in that, when user needs to decipher its user's private information, again input identical user biological information, encryption chip using this user biological information as described in secret key decryption encryption after information and decrypt user's private information.
8. method as claimed in claim 6, it is characterized in that, described encryption chip comprises terminal screen control module, enciphering algorithm module, the module communicated with terminal master chip, input control module and biometric information load module;
Described terminal screen control module is for outputting to terminal display screen by user's private information;
Described enciphering algorithm module is used for encrypting user's private information;
The described module communicated with terminal master chip is for communicating with terminal master chip;
Described input control module is used for control information input and input of receiving information;
Described biometric information load module is for gathering user biological information and identifying user biological information.
9. method as claimed in claim 6, is characterized in that, described cryptographic algorithm is one or the combination of AES, DES, RSA, MD5.
10. method as claimed in claim 6, is characterized in that, described user biological information is finger print information, one of iris information, facial information, venous information, ear line information or combine.
CN201110373961.3A 2011-11-22 2011-11-22 Terminal equipment and method for encrypting user information Active CN102419805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110373961.3A CN102419805B (en) 2011-11-22 2011-11-22 Terminal equipment and method for encrypting user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110373961.3A CN102419805B (en) 2011-11-22 2011-11-22 Terminal equipment and method for encrypting user information

Publications (2)

Publication Number Publication Date
CN102419805A CN102419805A (en) 2012-04-18
CN102419805B true CN102419805B (en) 2015-05-20

Family

ID=45944212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110373961.3A Active CN102419805B (en) 2011-11-22 2011-11-22 Terminal equipment and method for encrypting user information

Country Status (1)

Country Link
CN (1) CN102419805B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI488067B (en) * 2012-11-29 2015-06-11 Chi Pei Wang A method and a device for preventing the computer device from being screened on the screen
CN103559453B (en) * 2013-05-23 2017-10-10 深圳市中易通安全芯科技有限公司 A kind of data in mobile phone hardware encryption protecting method and system
CN103699847A (en) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 Fingerprint encryption method and device, and encrypted shooting method and device
US9455833B2 (en) * 2014-04-28 2016-09-27 Nxp B.V. Behavioral fingerprint in a white-box implementation
CN103929312A (en) * 2014-04-29 2014-07-16 深圳市中兴移动通信有限公司 Mobile terminal and method and system for protecting individual information of mobile terminal
CN105450597B (en) * 2014-08-14 2019-06-07 阿里巴巴集团控股有限公司 A kind of information transferring method and device
CN105656870B (en) * 2015-06-29 2019-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of data transmission method, apparatus and system
CN105760730A (en) * 2015-07-15 2016-07-13 石家庄蜗牛科技有限公司 System for mobile control and information protection through external iris recognition device
CN105760732A (en) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Authentication method, device and system
CN106100851B (en) * 2016-06-21 2019-06-25 李师华 Password management system, intelligent wristwatch and its cipher management method
CN106209381B (en) * 2016-07-12 2019-04-26 深圳市中易通安全芯科技有限公司 A kind of photo encipher-decipher method and its system
CN106612347A (en) * 2016-08-12 2017-05-03 成都为远信安电子科技有限公司 Mobile phone fingerprint module scheme with secure encryption function
CN106210962B (en) * 2016-09-22 2017-08-22 会听声学科技(北京)有限公司 A kind of ear line acoustic characteristic ONLINE RECOGNITION method and system designed suitable for noise cancelling headphone
CN107590383A (en) * 2017-08-30 2018-01-16 浙江九州量子信息技术股份有限公司 A kind of main password protecting System and method for based on SOC
CN113762971A (en) * 2021-05-17 2021-12-07 腾讯科技(深圳)有限公司 Data encryption method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893713A (en) * 2005-07-05 2007-01-10 索尼爱立信移动通信日本株式会社 Mobile terminal device, program and method for biometric encrypted personal identification number
CN101236591A (en) * 2007-01-31 2008-08-06 联想(北京)有限公司 Method, terminal and safe chip for guaranteeing critical data safety
CN102123027A (en) * 2011-03-15 2011-07-13 钱袋网(北京)信息技术有限公司 Information security processing method and mobile terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003006168A (en) * 2001-06-25 2003-01-10 Ntt Docomo Inc Method for authenticating mobile terminal and mobile terminal
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN101000703A (en) * 2006-11-30 2007-07-18 上海麦柯信息技术有限公司 Electronic payment terminal capable of ensuring confidentiality and integrity of information transmission
JP4656458B1 (en) * 2009-11-09 2011-03-23 Necインフロンティア株式会社 Handy terminal and payment method by handy terminal
CN102147662A (en) * 2011-03-14 2011-08-10 张龙其 Input terminal with keyboard and encryption module

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893713A (en) * 2005-07-05 2007-01-10 索尼爱立信移动通信日本株式会社 Mobile terminal device, program and method for biometric encrypted personal identification number
CN101236591A (en) * 2007-01-31 2008-08-06 联想(北京)有限公司 Method, terminal and safe chip for guaranteeing critical data safety
CN102123027A (en) * 2011-03-15 2011-07-13 钱袋网(北京)信息技术有限公司 Information security processing method and mobile terminal

Also Published As

Publication number Publication date
CN102419805A (en) 2012-04-18

Similar Documents

Publication Publication Date Title
CN102419805B (en) Terminal equipment and method for encrypting user information
US10187200B1 (en) System and method for generating a multi-stage key for use in cryptographic operations
CN100476762C (en) Safety memory device and data management method
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN103763091B (en) A kind of application program encryption and decryption method and encryption, decryption device
CN110059458B (en) User password encryption authentication method, device and system
US20180219688A1 (en) Information Transmission Method and Mobile Device
CN104834868A (en) Electronic data protection method, device and terminal equipment
CN101227275A (en) Enciphering method for combining accidental enciphering and exhaust algorithm decipher
CN104243149B (en) Encrypt and Decrypt method, device and server
CN103905188B (en) Utilize the method and intelligent cipher key equipment of intelligent cipher key equipment generation dynamic password
CN104331653A (en) Fingerprint decryption method and fingerprint decryption device
CN104253694A (en) Encrypting method for network data transmission
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
CN103378971A (en) Data encryption system and method
CN110771190A (en) Controlling access to data
CN108401494B (en) Method and system for transmitting data
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
CN107925571A (en) Utilize the information safety device and information security method of access property
CN102572750A (en) Method and terminal for protecting short messages
CN102118311B (en) Data transmission method
JPH1139082A (en) Keyboard device having security function and method therefor
CN103577763A (en) Mobile terminal device with data protection function and data protection method
CN110912683B (en) Password storage method and device and password verification method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201229

Address after: 251700 He Fang Xiang Liu Yao Huo Cun, Huimin County, Binzhou City, Shandong Province

Patentee after: Shandong Huimin Jinxiu Textile Co.,Ltd.

Address before: 518057 Ministry of justice, Zhongxing building, South Science and technology road, Nanshan District hi tech Industrial Park, Shenzhen, Guangdong

Patentee before: ZTE Corp.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220301

Address after: 315400 building e, No. 959, Chengxin Road, Panhuo street, Yinzhou District, Ningbo City, Zhejiang Province

Patentee after: Ningbo youth excellent product sharing technology Co.,Ltd.

Address before: 251700 He Fang Xiang Liu Yao Huo Cun, Huimin County, Binzhou City, Shandong Province

Patentee before: Shandong Huimin Jinxiu Textile Co.,Ltd.